Out of those, some are correctly implemented "fail if truncated" uses.
The rest... Some are weirdly open-coded snprintf() (series of strlcpy and
strlcat) and some are _very_ dubious. Either they really never get
truncated, or we have a problem. For example, this
kernel/module.c:2349: s += strlcpy(s, &mod->strtab[src[i].st_name],
smells really bad. We are truncating a bunch of strings dowsn to KSYM_NAME_LEN
there and storing them in a buffer, with spacing that matches _untruncated_
strings.